Bunn, Paul; Ostrovsky, Rafail Oblivious sampling with applications to two-party \(k\)-means clustering. (English) Zbl 1457.94104 J. Cryptology 33, No. 3, 1362-1403 (2020). MSC: 94A60 94A62 94A20 68M14 68P25 68M12 PDF BibTeX XML Cite \textit{P. Bunn} and \textit{R. Ostrovsky}, J. Cryptology 33, No. 3, 1362--1403 (2020; Zbl 1457.94104) Full Text: DOI OpenURL
Kiyoshima, Susumu Statistical concurrent non-malleable zero-knowledge from one-way functions. (English) Zbl 1457.94152 J. Cryptology 33, No. 3, 1318-1361 (2020). MSC: 94A60 94A62 68P25 68M12 PDF BibTeX XML Cite \textit{S. Kiyoshima}, J. Cryptology 33, No. 3, 1318--1361 (2020; Zbl 1457.94152) Full Text: DOI Link OpenURL
Jha, Ashwin; Nandi, Mridul Tight security of cascaded LRW2. (English) Zbl 1457.94141 J. Cryptology 33, No. 3, 1272-1317 (2020). MSC: 94A60 94A62 94A55 PDF BibTeX XML Cite \textit{A. Jha} and \textit{M. Nandi}, J. Cryptology 33, No. 3, 1272--1317 (2020; Zbl 1457.94141) Full Text: DOI OpenURL
Alhassan, Masaud Y.; Günther, Daniel; Kiss, Ágnes; Schneider, Thomas Efficient and scalable universal circuits. (English) Zbl 1462.94027 J. Cryptology 33, No. 3, 1216-1271 (2020). MSC: 94A60 94C05 PDF BibTeX XML Cite \textit{M. Y. Alhassan} et al., J. Cryptology 33, No. 3, 1216--1271 (2020; Zbl 1462.94027) Full Text: DOI OpenURL
Derbez, Patrick; Perrin, Léo Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE. (English) Zbl 1457.94119 J. Cryptology 33, No. 3, 1184-1215 (2020). MSC: 94A60 94A62 68P25 94A55 PDF BibTeX XML Cite \textit{P. Derbez} and \textit{L. Perrin}, J. Cryptology 33, No. 3, 1184--1215 (2020; Zbl 1457.94119) Full Text: DOI OpenURL
Beyne, Tim Block cipher invariants as eigenvectors of correlation matrices. (English) Zbl 1457.94099 J. Cryptology 33, No. 3, 1156-1183 (2020). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{T. Beyne}, J. Cryptology 33, No. 3, 1156--1183 (2020; Zbl 1457.94099) Full Text: DOI OpenURL
Wegener, Felix; De Meyer, Lauren; Moradi, Amir Spin me right round rotational symmetry for FPGA-specific AES: extended version. (English) Zbl 1457.94192 J. Cryptology 33, No. 3, 1114-1155 (2020). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{F. Wegener} et al., J. Cryptology 33, No. 3, 1114--1155 (2020; Zbl 1457.94192) Full Text: DOI OpenURL
Albrecht, Martin R.; Farshim, Pooya; Han, Shuai; Hofheinz, Dennis; Larraia, Enrique; Paterson, Kenneth G. Multilinear maps from obfuscation. (English) Zbl 1457.94090 J. Cryptology 33, No. 3, 1080-1113 (2020). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{M. R. Albrecht} et al., J. Cryptology 33, No. 3, 1080--1113 (2020; Zbl 1457.94090) Full Text: DOI OpenURL
Kanukurthi, Bhavana; Obbattu, Sai Lakshmi Bhavana; Sekar, Sruthi Four-state non-malleable codes with explicit constant rate. (English) Zbl 1457.94145 J. Cryptology 33, No. 3, 1044-1079 (2020). MSC: 94A60 94A62 94B35 PDF BibTeX XML Cite \textit{B. Kanukurthi} et al., J. Cryptology 33, No. 3, 1044--1079 (2020; Zbl 1457.94145) Full Text: DOI OpenURL
Bar-On, Achiya; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi Improved key recovery attacks on reduced-round AES with practical data and memory complexities. (English) Zbl 1457.94097 J. Cryptology 33, No. 3, 1003-1043 (2020). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{A. Bar-On} et al., J. Cryptology 33, No. 3, 1003--1043 (2020; Zbl 1457.94097) Full Text: DOI OpenURL
Kowalczyk, Lucas; Wee, Hoeteck Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin. (English) Zbl 1457.94153 J. Cryptology 33, No. 3, 954-1002 (2020). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{L. Kowalczyk} and \textit{H. Wee}, J. Cryptology 33, No. 3, 954--1002 (2020; Zbl 1457.94153) Full Text: DOI OpenURL
Applebaum, Benny; Holenstein, Thomas; Mishra, Manoj; Shayevitz, Ofer The communication complexity of private simultaneous messages, revisited. (English) Zbl 1457.94003 J. Cryptology 33, No. 3, 917-953 (2020). MSC: 94A05 94A15 94A60 94A62 68M12 68P25 PDF BibTeX XML Cite \textit{B. Applebaum} et al., J. Cryptology 33, No. 3, 917--953 (2020; Zbl 1457.94003) Full Text: DOI OpenURL
Dunkelman, Orr; Keller, Nathan; Lambooij, Eran; Sasaki, Yu A practical forgery attack on Lilliput-AE. (English) Zbl 1457.94126 J. Cryptology 33, No. 3, 910-916 (2020). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{O. Dunkelman} et al., J. Cryptology 33, No. 3, 910--916 (2020; Zbl 1457.94126) Full Text: DOI OpenURL
Dinur, Itai Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem. (English) Zbl 1457.94123 J. Cryptology 33, No. 3, 874-909 (2020). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{I. Dinur}, J. Cryptology 33, No. 3, 874--909 (2020; Zbl 1457.94123) Full Text: DOI OpenURL
Dinur, Itai; Keller, Nathan; Klein, Ohad An optimal distributed discrete log protocol with applications to homomorphic secret sharing. (English) Zbl 1457.94124 J. Cryptology 33, No. 3, 824-873 (2020). MSC: 94A60 94A62 68M12 PDF BibTeX XML Cite \textit{I. Dinur} et al., J. Cryptology 33, No. 3, 824--873 (2020; Zbl 1457.94124) Full Text: DOI OpenURL
Bao, Zhenzhen; Dinur, Itai; Guo, Jian; Leurent, Gaëtan; Wang, Lei Generic attacks on hash combiners. (English) Zbl 1457.94095 J. Cryptology 33, No. 3, 742-823 (2020). MSC: 94A60 94A62 68P25 PDF BibTeX XML Cite \textit{Z. Bao} et al., J. Cryptology 33, No. 3, 742--823 (2020; Zbl 1457.94095) Full Text: DOI Link OpenURL
Chakraborti, Avik; Iwata, Tetsu; Minematsu, Kazuhiko; Nandi, Mridul Blockcipher-based authenticated encryption: how small can we go? (English) Zbl 1457.94107 J. Cryptology 33, No. 3, 703-741 (2020). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{A. Chakraborti} et al., J. Cryptology 33, No. 3, 703--741 (2020; Zbl 1457.94107) Full Text: DOI OpenURL
Kim, Sam; Wu, David J. Multi-theorem preprocessing NIZKs from lattices. (English) Zbl 1457.94151 J. Cryptology 33, No. 3, 619-702 (2020). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{S. Kim} and \textit{D. J. Wu}, J. Cryptology 33, No. 3, 619--702 (2020; Zbl 1457.94151) Full Text: DOI OpenURL